Abstract
Owing to efficient machine recognition, QR codes have been widely used in many aspects such as information management, electronic identity and mobile payment. Any QR code reader has access to the message contained in a QR code; therefore, in formation security becomes a major challenge to QR codes for private use. Moreover, human vision is hard to distinguish a QR code from others because its appearance looks randomly. In this paper, we propose a visual secret sharing scheme to achieve a rich QR code with three-layer information storage. In the three layers, the first one and the second one are respectively recognizable by human vision and QR code readers, while the third layer is designed for storing private data. Additionally, we also highlight the low computational complexity of secret extraction from the rich QR code.
Similar content being viewed by others
References
Biswas R, Sil J (2012) An improved canny edge detection algorithm based on type-2 fuzzy sets. Procedia Technology 4(11):820–824
Chen C (2016) QR code authentication with embedded message authentication code. Mobile Networks and Applications 22:383–394
Cheng Y, Fu Z, Yu B, Shen G (2017) A new two-level qr code with visual cryptography scheme. Multimed Tools Appl:1–21
Chuang JC, Hu YC, Ko HJ (2010) A novel secret sharing technique using qr code. International Journal of Image Processing 4(5):468–475
Huang CT, Zhang YH, Lin LC, Wang WJ, Wang SJ (2016) Mutual authentications to parties with qr-code applications in mobile systems. Int J Inf Secur:1–16
ISO/IEC 18004 (2000) Information technology automatic identification and data capture techniques. Bar code Symbology-QR code
Jiang D, Xu Z, Chen Z et al (2011) Joint time-frequency sparse estimation of large-scale network traffic. Comput Netw 55(15):3533–3547
Jiang D, Xu Z, Zhang P et al (2014) A transform domain-based anomaly detection approach to network-wide traffic. J Netw Comput Appl 40(2):292–306
Jiang D, Xu Z, Li W et al (2015) Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks. J Syst Softw 104:152–165
Jiang D, Yao C, Xu Z et al (2015) Multi-scale anomaly detection for high-speed network traffic. Transactions on Emerging Telecommunications Technologies 26:308–317
Jiang D, Zhang P, Lv Z et al (2016) Energy-efficient multi-constraint routing algorithm with load balancing for Smart City applications. IEEE Internet Things J 3(6):1437–1447
Jiang D, Yuan Z, Zhang P et al (2016) A traffic anomaly detection approach in communication networks for applications of multimedia medical devices. Multimed Tools Appl 75(22):14281–14305
Jiang D, Huo L, Lv Z et al (2018) A joint multi-criteria utility-based network selection approach for vehicle-to-infrastructure networking. IEEE Trans Intell Transp Syst pp(99):1–15
Jiang D, Huo L, Li Y (2018) Fine granularity inference and estimations to network traffic for SDN. PLoS One 13(5):e0194302
Krishna MB, Dugar A (2016) Product authentication using QR codes: a mobile application to combat counterfeiting. Wirel Pers Commun 90:381–398
Lin PY (2016) Distributed secret sharing approach with cheater prevention based on QR code. IEEE Transactions on Industrial Informatics 12:384–392
Lin PY, Chen YH (2017) High payload secret hiding technology for QR codes. EURASIP Journal on Image and Video Processing 1:14
Liu Y, Fu ZX, Wang YW (2016) Two-level information management scheme based on visual cryptography and QR code. Application Research of Computers 33:3460–3463
Naor M, Shamir A (1995) Visual cryptography. EUROCRYPT 1994: advances in cryptology — EUROCRYPT’94 950:1–12
Patvardhan C, Kumar P, Lakshmi CV (2017) Effective color image watermarking scheme using YCbCr color space and QR code. Multimed Tools Appl 77:12655–12677
Tkachenko I, Puech W, Destruel C, Strauss O, Gaudin JM, Guichard C (2016) Two-level QR code for private message sharing and document authentication. IEEE Transactions on Information Forensics and Security 11:571–583
Tuyls P, Hollmann HD, Lint JH, Tolhuizen L (2005) XOR-based visual cryptography schemes. Des Codes Crypt 37:169–186
Ulichney RA (1993) Void-and-cluster method for dither array generation. IS&T/SPIE symposium on electronic imaging science and technology. In: Proc. Conf. Human vision, visual processing and digital display IV SPIE, vol 1913, pp 332–343
Wan S, Lu Y, Yan X, Wang Y, Chang C (2017) Visual secret sharing scheme for (k, n) threshold based on QR code with multiple decryptions. J Real-Time Image Proc 9:1–16
Wang Z, Arce GR, Crescenzo GD (2009) Halftone visual cryptography via error diffusion. IEEE Transactions on Information Forensics & Security 4(3):383–396
Wang J, Song L, Liang X, Liu Y, Liu P (2016) Secure and noise-free nonlinear optical cryptosystem based on phase-truncated Fresnel diffraction and QR code. Opt Quant Electron 48:523
Wang G, Liu F, Yan WQ (2016) 2D barcodes for visual cryptography. Multimed Tools Appl 75(2):1223–1241
Yang CN, Sun LZ, Cai SR (2016) Extended color visual cryptography for black and white secret image. Theor Comput Sci 609(P1):143–161
Acknowledgments
This work was supported by the National Natural Science Foundation of China (grant 61602513) and the Outstanding Youth Foundation of Zhengzhou Information Science and Technology Institute (grant 2016611303).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Fu, Z., Cheng, Y. & Yu, B. Rich QR code with three-layer information using visual secret sharing scheme. Multimed Tools Appl 78, 19861–19875 (2019). https://doi.org/10.1007/s11042-019-7333-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-7333-x